|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1317842415 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220518s2021 au a ob 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d OCLCF
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9789201237200
|q (electronic bk.)
|
020 |
|
|
|a 9201237200
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)1317842415
|
050 |
|
4 |
|a TK9153
|
082 |
0 |
4 |
|a 621.48/35
|2 23/eng/20220531
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Computer security techniques for nuclear facilities :
|b technical guidance.
|
264 |
|
1 |
|a Vienna :
|b International Atomic Energy Agency,
|c 2021.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IAEA nuclear security series ;
|v no. 17-T (Rev. 1)
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
|
|
|a Online resource; title from PDF title page (EBSCO, viewed May 31, 2022).
|
505 |
0 |
|
|a Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. Basic Concepts and Relationships -- Nuclear security and computer security -- Facility functions, computer security levels and computer security zones -- Computer security risk management -- Competing demands of simplicity, efficiency and computer security -- Conceptual nuclear facility zone model -- Computer security measures -- Computer based systems and digital assets (including SDAs) -- Cyber-attack -- Interface with safety -- 3. General Considerations for Computer Security
|
505 |
8 |
|
|a Identification of facility functions -- Protection of sensitive information and digital assets -- Risk informed approach -- Risk assessment and management -- Computer security levels based on a graded approach -- 4. Facility Computer Security Risk Management -- Objective of facility computer security risk management -- Outline of facility computer security risk management -- Inputs to facility computer security risk management -- Phases of facility computer security risk management -- Scope definition -- Facility characterization -- Identification of facility functions
|
505 |
8 |
|
|a Intrinsic significance of facility functions -- Potential effects of compromise of a system on facility function -- Interdependencies between facility functions -- Necessary timeliness and accuracy for facility function interdependencies -- Target identification -- Documentation of facility functions -- Threat characterization -- Sources of threat information -- Facility specific threat characterization -- Additional considerations for insider threats -- Specification of computer security requirements -- Computer security policy and computer security programme
|
505 |
8 |
|
|a Assignment of systems performing facility functions to computer security levels -- Defensive computer security architecture specification -- Requirements in the DCSA specification to apply a graded approach -- Requirements in the DCSA specification to apply defence in depth -- Trust model -- Relationship with system computer security risk management -- performed for each system -- Assurance activities -- Evaluation -- Verification -- Validation -- Scenario identification and development -- Facility computer security risk management output -- 5. System Computer Security Risk Management
|
505 |
8 |
|
|a General considerations -- Overview -- System computer security risk management process -- Overall defensive computer security architecture requirements for computer security -- Definition of system boundaries -- Definition and construction of computer security zones -- Identification of digital assets -- System computer security architecture, including digital asset analysis -- Verification of the system computer security risk assessment -- System computer security risk management report
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Nuclear facilities
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Installations nucléaires
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Nuclear facilities
|x Security measures
|2 fast
|
710 |
2 |
|
|a International Atomic Energy Agency.
|
830 |
|
0 |
|a IAEA nuclear security series ;
|v no. 17-T (Rev. 1)
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3282319
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6985992
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3282319
|
994 |
|
|
|a 92
|b IZTAP
|